Cryptographic Protocols with Everyday Objects
- Published in 2011
- Added on
In the collections
Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are unavailable. We discuss here various protocols for solving cryptographic problems using everyday objects: coins, dice, cards, and envelopes.
Links
Other information
- key
- CryptographicProtocolsWithEverydayObjects
- type
- article
- date_added
- 2016-11-17
- date_published
- 2011-09-30
BibTeX entry
@article{CryptographicProtocolsWithEverydayObjects, key = {CryptographicProtocolsWithEverydayObjects}, type = {article}, title = {Cryptographic Protocols with Everyday Objects}, author = {James Heather and Steve Schneider and Vanessa Teague}, abstract = {Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are unavailable. We discuss here various protocols for solving cryptographic problems using everyday objects: coins, dice, cards, and envelopes.}, comment = {}, date_added = {2016-11-17}, date_published = {2011-09-30}, urls = {http://www.computing.surrey.ac.uk/personal/st/S.Schneider/papers/2011/cryptoforma11a.pdf}, collections = {Easily explained,Protocols and strategies,Things to make and do}, url = {http://www.computing.surrey.ac.uk/personal/st/S.Schneider/papers/2011/cryptoforma11a.pdf}, urldate = {2016-11-17}, year = 2011 }